GitHub监控消息提醒!!!
更新了:CVE-2024
描述:POC for CVE-2024-42327, an authenticated SQL Injection in Zabbix through the user.get API Method
URL:https://github.com/watchdog1337/CVE-2024-42327_Zabbix_SQLI
标签:#CVE-2024
更新了:CVE-2024
描述:POC for CVE-2024-42327, an authenticated SQL Injection in Zabbix through the user.get API Method
URL:https://github.com/watchdog1337/CVE-2024-42327_Zabbix_SQLI
标签:#CVE-2024
GitHub
GitHub - watchdog1337/CVE-2024-42327_Zabbix_SQLI: POC for CVE-2024-42327, an authenticated SQL Injection in Zabbix through the…
POC for CVE-2024-42327, an authenticated SQL Injection in Zabbix through the user.get API Method - watchdog1337/CVE-2024-42327_Zabbix_SQLI
GitHub监控消息提醒!!!
更新了:绕过
描述:APP渗透绕过反代理反证书检测
URL:https://github.com/chaos198800/APP-shen-tou-rao-guo-fan-dai-li-fan-zheng-shu-jian-ce
标签:#绕过
更新了:绕过
描述:APP渗透绕过反代理反证书检测
URL:https://github.com/chaos198800/APP-shen-tou-rao-guo-fan-dai-li-fan-zheng-shu-jian-ce
标签:#绕过
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Technical Details and Exploit for CVE-2024-11393
URL:https://github.com/Piyush-Bhor/CVE-2024-11393
标签:#CVE-2024
更新了:CVE-2024
描述:Technical Details and Exploit for CVE-2024-11393
URL:https://github.com/Piyush-Bhor/CVE-2024-11393
标签:#CVE-2024
GitHub
GitHub - Piyush-Bhor/CVE-2024-11393: Technical Details and Exploit for CVE-2024-11393
Technical Details and Exploit for CVE-2024-11393. Contribute to Piyush-Bhor/CVE-2024-11393 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码注入
描述:JCore致力于提供C语言最实用的数据结构、工具、算法。目前已提供一个内存调试工具,采用代码注入的方法,无需重新编译原始程序,即可调试它的内存问题。
URL:https://github.com/lengjingzju/jcore
标签:#代码注入
更新了:代码注入
描述:JCore致力于提供C语言最实用的数据结构、工具、算法。目前已提供一个内存调试工具,采用代码注入的方法,无需重新编译原始程序,即可调试它的内存问题。
URL:https://github.com/lengjingzju/jcore
标签:#代码注入
GitHub
GitHub - lengjingzju/jcore: JCore致力于提供C语言最实用的数据结构和实用工具:数据结构包含动态数组、动态字符串、链表、哈希表、位图、红黑树和优先级队列等;实用工具包含内存调试工具、数据结构生成工具、日志工具和线程池定时器等。
JCore致力于提供C语言最实用的数据结构和实用工具:数据结构包含动态数组、动态字符串、链表、哈希表、位图、红黑树和优先级队列等;实用工具包含内存调试工具、数据结构生成工具、日志工具和线程池定时器等。 - lengjingzju/jcore
GitHub监控消息提醒!!!
更新了:RCE
描述:Collecting RCE and SQL injection vulnerability reproduction
URL:https://github.com/CoolCoolTomato/FuckTheWorld
标签:#RCE
更新了:RCE
描述:Collecting RCE and SQL injection vulnerability reproduction
URL:https://github.com/CoolCoolTomato/FuckTheWorld
标签:#RCE
GitHub
CoolCoolTomato/FuckTheWorld
Collecting RCE and SQL injection vulnerability reproduction - CoolCoolTomato/FuckTheWorld
GitHub监控消息提醒!!!
更新了:hvv
描述:macOS上的小而美【Fofa、Shodan、Hunter、Zoomeye、Quake网络空间搜索引擎】闪电搜索器;GUI图形化(Mac/Windows)渗透测试信息搜集工具;资产搜集引擎;hw红队工具hvv
URL:https://github.com/Bug-Hunter-X/React-19--Concurrent-Mode-Conflicts-with-useSyncExternalStore-and-Asynchronous-Updates-9hvvn
标签:#hvv
更新了:hvv
描述:macOS上的小而美【Fofa、Shodan、Hunter、Zoomeye、Quake网络空间搜索引擎】闪电搜索器;GUI图形化(Mac/Windows)渗透测试信息搜集工具;资产搜集引擎;hw红队工具hvv
URL:https://github.com/Bug-Hunter-X/React-19--Concurrent-Mode-Conflicts-with-useSyncExternalStore-and-Asynchronous-Updates-9hvvn
标签:#hvv
GitHub
GitHub - Bug-Hunter-X/React-19--Concurrent-Mode-Conflicts-with-useSyncExternalStore-and-Asynchronous-Updates-9hvvn: React 19 Concurrent…
React 19 Concurrent Rendering Issues with External Stores: Unexpected UI updates or silent data corruption in complex components using useSyncExternalStore with legacy code or asynchronous operatio...
GitHub监控消息提醒!!!
更新了:反序列化
描述:Shiro反序列化漏洞综合利用工具
URL:https://github.com/chaos198800/Shiro-fan-xu-lie-hua-lou-dong-zong-he-li-yong-gong-ju
标签:#反序列化
更新了:反序列化
描述:Shiro反序列化漏洞综合利用工具
URL:https://github.com/chaos198800/Shiro-fan-xu-lie-hua-lou-dong-zong-he-li-yong-gong-ju
标签:#反序列化
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Proof of concept of the CVE-2024-24549, Exploit in Python.
URL:https://github.com/JFOZ1010/CVE-2024-24549
标签:#CVE-2024
更新了:CVE-2024
描述:Proof of concept of the CVE-2024-24549, Exploit in Python.
URL:https://github.com/JFOZ1010/CVE-2024-24549
标签:#CVE-2024
GitHub
GitHub - JFOZ1010/CVE-2024-24549: Proof of concept of the CVE-2024-24549, Exploit in Python.
Proof of concept of the CVE-2024-24549, Exploit in Python. - GitHub - JFOZ1010/CVE-2024-24549: Proof of concept of the CVE-2024-24549, Exploit in Python.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:This repository is a proof of concept (POC) for CVE-2024-23334, demonstrating an attempt to replicate the bug in aiohttp that leads to Local File Inclusion (LFI).
URL:https://github.com/Betan423/CVE-2024-23334-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:This repository is a proof of concept (POC) for CVE-2024-23334, demonstrating an attempt to replicate the bug in aiohttp that leads to Local File Inclusion (LFI).
URL:https://github.com/Betan423/CVE-2024-23334-PoC
标签:#CVE-2024
GitHub
GitHub - Betan423/CVE-2024-23334-PoC: This repository is a proof of concept (POC) for CVE-2024-23334, demonstrating an attempt…
This repository is a proof of concept (POC) for CVE-2024-23334, demonstrating an attempt to replicate the bug in aiohttp that leads to Local File Inclusion (LFI). - Betan423/CVE-2024-23334-PoC
GitHub监控消息提醒!!!
更新了:绕过
描述:bypass google play protect with pairipcore,绕过play保护,修复apk,防止闪退。xapk merge to apk;apks to apk;remove sign check.
URL:https://github.com/qyzhaojinxi/bypass_pairipcore
标签:#绕过
更新了:绕过
描述:bypass google play protect with pairipcore,绕过play保护,修复apk,防止闪退。xapk merge to apk;apks to apk;remove sign check.
URL:https://github.com/qyzhaojinxi/bypass_pairipcore
标签:#绕过
GitHub
GitHub - qyzhaojinxi/bypass_pairipcore: bypass pairip, bypass google play protect with pairipcore, bypass google play protect with…
bypass pairip, bypass google play protect with pairipcore, bypass google play protect with warning dialog,绕过play保护,破解谷歌加固,修复apk,防止闪退,移除谷歌保护风险弹窗。xapk merge to apk;apks to apk;remove sign check,unlim...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A simple python noscript to test for CVE-2024-9441.
URL:https://github.com/jk-mayne/CVE-2024-9441-Checker
标签:#CVE-2024
更新了:CVE-2024
描述:A simple python noscript to test for CVE-2024-9441.
URL:https://github.com/jk-mayne/CVE-2024-9441-Checker
标签:#CVE-2024
GitHub
GitHub - jk-mayne/CVE-2024-9441-Checker: A simple python noscript to test for CVE-2024-9441.
A simple python noscript to test for CVE-2024-9441. - GitHub - jk-mayne/CVE-2024-9441-Checker: A simple python noscript to test for CVE-2024-9441.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13
URL:https://github.com/Dit-Developers/CVE-2024-0044-
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13
URL:https://github.com/Dit-Developers/CVE-2024-0044-
标签:#CVE-2024
GitHub
GitHub - Dit-Developers/CVE-2024-0044-: CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions…
CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13 - Dit-Developers/CVE-2024-0044-
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:This is an exploit for chemistry Hack the Box machines that automates a \"terminal\" enviornment using CVE-2024-23346
URL:https://github.com/MAWK0235/CVE-2024-23346
标签:#CVE-2024
更新了:CVE-2024
描述:This is an exploit for chemistry Hack the Box machines that automates a \"terminal\" enviornment using CVE-2024-23346
URL:https://github.com/MAWK0235/CVE-2024-23346
标签:#CVE-2024
GitHub
GitHub - MAWK0235/CVE-2024-23346: This is an exploit for CVE-2024-23346 that acts as a "terminal" (tested on chemistry.htb)
This is an exploit for CVE-2024-23346 that acts as a "terminal" (tested on chemistry.htb) - MAWK0235/CVE-2024-23346
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Repository for archiving Cobalt Strike configuration
URL:https://github.com/ncav/ThreatFox_Reporter.py
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Repository for archiving Cobalt Strike configuration
URL:https://github.com/ncav/ThreatFox_Reporter.py
标签:#Cobalt Strike
GitHub
GitHub - ncav/ThreatFox_Reporter.py: This python noscript will query Shodan for product cobalt strike. From those results, the noscript…
This python noscript will query Shodan for product cobalt strike. From those results, the noscript will search ThreatFox ip database for any matches. If there are no matches, the new IP address will be...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Towson University Red Team Kaiju Toolkit for Case Studies 2025
URL:https://github.com/megatop1/CaseStudiesKaiju-2025
标签:#Red Team
更新了:Red Team
描述:Towson University Red Team Kaiju Toolkit for Case Studies 2025
URL:https://github.com/megatop1/CaseStudiesKaiju-2025
标签:#Red Team
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:这是一个 XXE 漏洞检测工具(This is an XXE vulnerability detection tool)
URL:https://github.com/Weijin-wj/XXECheck
标签:#漏洞检测
更新了:漏洞检测
描述:这是一个 XXE 漏洞检测工具(This is an XXE vulnerability detection tool)
URL:https://github.com/Weijin-wj/XXECheck
标签:#漏洞检测
GitHub
GitHub - Weijin-wj/XXECheck: 这是一个 XXE 漏洞检测工具(This is an XXE vulnerability detection tool)
这是一个 XXE 漏洞检测工具(This is an XXE vulnerability detection tool) - Weijin-wj/XXECheck
GitHub监控消息提醒!!!
更新了:webshell
描述:Operation Digital Eye is a targeted cyber-espionage campaign leveraging custom tools such as PHPsert webshells, mimCN utilities and Visual Studio Code tunnels.
URL:https://github.com/sl33pydata/Operation_Digital_Eye
标签:#webshell
更新了:webshell
描述:Operation Digital Eye is a targeted cyber-espionage campaign leveraging custom tools such as PHPsert webshells, mimCN utilities and Visual Studio Code tunnels.
URL:https://github.com/sl33pydata/Operation_Digital_Eye
标签:#webshell
GitHub
GitHub - sl33pydata/Operation_Digital_Eye: Operation Digital Eye is a targeted cyber-espionage campaign leveraging custom tools…
Operation Digital Eye is a targeted cyber-espionage campaign leveraging custom tools such as PHPsert webshells, mimCN utilities and Visual Studio Code tunnels. - GitHub - sl33pydata/Operation_Digi...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Vulnerabilidad CVE-2024-24926 afecta al tema Brooklyn de WordPress
URL:https://github.com/moften/CVE-2024-24926
标签:#CVE-2024
更新了:CVE-2024
描述:Vulnerabilidad CVE-2024-24926 afecta al tema Brooklyn de WordPress
URL:https://github.com/moften/CVE-2024-24926
标签:#CVE-2024
GitHub
GitHub - moften/CVE-2024-24926: Vulnerabilidad CVE-2024-24926 afecta al tema Brooklyn de WordPress
Vulnerabilidad CVE-2024-24926 afecta al tema Brooklyn de WordPress - moften/CVE-2024-24926
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-55557
URL:https://github.com/partywavesec/CVE-2024-55557
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-55557
URL:https://github.com/partywavesec/CVE-2024-55557
标签:#CVE-2024
GitHub
GitHub - partywavesec/CVE-2024-55557: CVE-2024-55557
CVE-2024-55557. Contribute to partywavesec/CVE-2024-55557 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Palo Alto Networks PAN-OS(CVE-2024-9474) POC
URL:https://github.com/coskper-papa/PAN-OS_CVE-2024-9474
标签:#CVE-2024
更新了:CVE-2024
描述:Palo Alto Networks PAN-OS(CVE-2024-9474) POC
URL:https://github.com/coskper-papa/PAN-OS_CVE-2024-9474
标签:#CVE-2024
GitHub
GitHub - coskper-papa/PAN-OS_CVE-2024-9474: Palo Alto Networks PAN-OS(CVE-2024-9474) POC
Palo Alto Networks PAN-OS(CVE-2024-9474) POC. Contribute to coskper-papa/PAN-OS_CVE-2024-9474 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:An example of a repo that would make use of the CVE-2024-32002
URL:https://github.com/jolibb55/CVE-2024-32002_RCE
标签:#CVE-2024
更新了:CVE-2024
描述:An example of a repo that would make use of the CVE-2024-32002
URL:https://github.com/jolibb55/CVE-2024-32002_RCE
标签:#CVE-2024
GitHub
GitHub - jolibb55/CVE-2024-32002_RCE: Exploit PoC for CVE-2024-32002
Exploit PoC for CVE-2024-32002. Contribute to jolibb55/CVE-2024-32002_RCE development by creating an account on GitHub.